Right now I'm here:
Step One: Scan for Spyware/Adware
I ran SUPERAntiSpyware, the process finished and i still having certain infections.
Then I've tried to run Panda, but i couldn't. That's why i've decided to send to you guys my last log.
I hope you all find any help.
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 04/03/2008 at 10:13 AM
Application Version : 4.0.1154
Core Rules Database Version : 3422
Trace Rules Database Version: 1239
Scan type : Complete Scan
Total Scan Time : 00:43:20
Memory items scanned : 527
Memory threats detected : 10
Registry items scanned : 5433
Registry threats detected : 51
File items scanned : 80904
File threats detected : 44
Adware.Vundo Variant/Resident
C:\WINDOWS\SYSTEM32\WVUOEUVO.DLL
C:\WINDOWS\SYSTEM32\WVUOEUVO.DLL
Trojan.NewDotNet-Installer
C:\PROGRAM FILES\NEWDOTNET\NEWDOTNET6_38.DLL
C:\PROGRAM FILES\NEWDOTNET\NEWDOTNET6_38.DLL
Trojan.Downloader-Oreon-A/Resident
C:\WINDOWS\INSTALLER\{128C997B-656F-4E8D-B1E6-B024179D2868}\CHKVOLUME.DLL
C:\WINDOWS\INSTALLER\{128C997B-656F-4E8D-B1E6-B024179D2868}\CHKVOLUME.DLL
Trojan.Downloader-AntiViirus
C:\PROGRAM FILES\ANTIVIIRUS.EXE
C:\PROGRAM FILES\ANTIVIIRUS.EXE
[antiviirus] C:\PROGRAM FILES\ANTIVIIRUS.EXE
C:\WINDOWS\Prefetch\ANTIVIIRUS.EXE-10A2E3A4.pf
Trojan.Unclassified/Tmp-Gen
C:\PROGRAM FILES\TMP0.EXE
C:\PROGRAM FILES\TMP0.EXE
C:\PROGRAM FILES\TMP1.EXE
C:\PROGRAM FILES\TMP1.EXE
C:\PROGRAM FILES\TMP2.EXE
C:\PROGRAM FILES\TMP2.EXE
C:\PROGRAM FILES\TMP3.EXE
C:\PROGRAM FILES\TMP3.EXE
C:\WINDOWS\Prefetch\TMP0.EXE-165F1111.pf
C:\WINDOWS\Prefetch\TMP1.EXE-389FCCA1.pf
C:\WINDOWS\Prefetch\TMP2.EXE-012BC19F.pf
C:\WINDOWS\Prefetch\TMP3.EXE-3AF74FDF.pf
Adware.SXGAdvisor-A
C:\WINDOWS\SVPEKGONWDN.DLL
C:\WINDOWS\SVPEKGONWDN.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{88425A92-EB25-4ABA-A863-3380D2C570B7}
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\InprocServer32
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\InprocServer32#ThreadingModel
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\ProgID
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\Programmable
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\TypeLib
HKCR\CLSID\{88425A92-EB25-4ABA-A863-3380D2C570B7}\VersionIndependentProgID
Trojan.Unclassified/GTS
C:\WINDOWS\STFNGDVW.DLL
C:\WINDOWS\STFNGDVW.DLL
HKLM\Software\Microsoft\Internet Explorer\Toolbar#{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\InprocServer32
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\InprocServer32#ThreadingModel
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\ProgID
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\Programmable
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\TypeLib
HKCR\CLSID\{505968FB-8A4C-4CAB-8EA1-A8D9C0B91DCA}\VersionIndependentProgID
HKCR\stfngdvw.1
HKCR\stfngdvw
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}\1.0
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}\1.0\0
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}\1.0\0\win32
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}\1.0\FLAGS
HKCR\TypeLib\{4C528A01-4096-41F4-B410-E4CC5514BD88}\1.0\HELPDIR
Trojan.Media-Codec/V4
HKLM\Software\Classes\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}\Implemented Categories
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}\InprocServer32
HKCR\CLSID\{062F3F8B-CB94-4D76-A98A-EF800A438F01}\InprocServer32#ThreadingModel
C:\PROGRAM FILES\VIDEO ADD-ON\ICTMDL.DLL
HKLM\Software\Microsoft\Internet Explorer\Toolbar#{062F3F8B-CB94-4D76-A98A-EF800A438F01}
HKU\S-1-5-21-3456917475-4237882370-1371069923-1007\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{062F3F8B-CB94-4D76-A98A-EF800A438F01}
C:\PROGRAM FILES\VIDEO ADD-ON\ISFMM.EXE
C:\PROGRAM FILES\VIDEO ADD-ON\UNINST.EXE
Unclassified.Unknown Origin
HKLM\Software\Classes\CLSID\{0656A137-B161-CADD-9777-E37A75727E78}
HKU\S-1-5-21-3456917475-4237882370-1371069923-1007\Software\Classes\CLSID\{0656A137-B161-CADD-9777-E37A75727E78}
HKCR\CLSID\{0656A137-B161-CADD-9777-E37A75727E78}
Adware.Vundo-Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F267FF77-069C-48B3-9396-47CA8BA9AEED}
HKCR\CLSID\{F267FF77-069C-48B3-9396-47CA8BA9AEED}
HKCR\CLSID\{F267FF77-069C-48B3-9396-47CA8BA9AEED}\InprocServer32
HKCR\CLSID\{F267FF77-069C-48B3-9396-47CA8BA9AEED}\InprocServer32#ThreadingModel
Trojan.NewDotNet
SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001
SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002
SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000016
SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000017
HKU\.DEFAULT\Software\New.net
HKU\S-1-5-21-3456917475-4237882370-1371069923-1007\Software\New.net
HKU\S-1-5-18\Software\New.net
C:\Program Files\NewDotNet
Adware.Tracking Cookie
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@nextag[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@serving-sys[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@enhance[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@tribalfusion[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@advertising[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@adbrite[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@pro-market[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@doubleclick[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@apmebf[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@adult-youtube-8[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\[email protected][2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@overture[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@atdmt[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@adrevolver[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@fastclick[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@adecn[1].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@realmedia[2].txt
C:\Documents and Settings\Compaq_Administrator\Cookies\compaq_administrator@findwhat[1].txt
Adware.Casino Games (Golden Palace Casino)
HKU\S-1-5-21-3456917475-4237882370-1371069923-1007\Software\Golden Palace Casino PT
Browser Hijacker.Favorites
C:\DOCUMENTS AND SETTINGS\COMPAQ_ADMINISTRATOR\FAVORITES\ONLINE SECURITY TEST.URL
InternetDelivery
C:\PROGRAM FILES\INET DELIVERY\INTDEL.EXE